Warning: Permanently added '10.128.1.113' (ECDSA) to the list of known hosts. 2022/09/22 22:00:09 ignoring optional flag "sandboxArg"="0" 2022/09/22 22:00:09 parsed 1 programs 2022/09/22 22:00:09 executed programs: 0 [ 37.331602][ T24] kauditd_printk_skb: 65 callbacks suppressed [ 37.331612][ T24] audit: type=1400 audit(1663884009.419:148): avc: denied { mounton } for pid=401 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.334539][ T400] In ext4_xattr_set_entry s ffffc9000098f7a0, last = ffff88811dec14a4, name len 16 [ 37.337725][ T24] audit: type=1400 audit(1663884009.419:149): avc: denied { mount } for pid=401 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.405308][ T404] In ext4_xattr_set_entry s ffffc9000099f7c0, last = ffff88811dec15a4, name len 16 [ 37.415872][ T24] audit: type=1400 audit(1663884009.509:150): avc: denied { mounton } for pid=405 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 37.443209][ T24] audit: type=1400 audit(1663884009.509:151): avc: denied { module_request } for pid=405 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 37.451795][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.472380][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.479629][ T405] device bridge_slave_0 entered promiscuous mode [ 37.486811][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.493851][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.501179][ T405] device bridge_slave_1 entered promiscuous mode [ 37.527533][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.534587][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.541939][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.549301][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.565460][ T75] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.572929][ T75] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.580186][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.587910][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.611902][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.620204][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.628924][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.637721][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.647648][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.656200][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.664632][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.671853][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.679314][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.687623][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.694686][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.702093][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.709957][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.721226][ T24] audit: type=1400 audit(1663884009.809:152): avc: denied { mount } for pid=405 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 37.724787][ T405] In ext4_xattr_set_entry s ffffc90000b177a0, last = ffff88811dec16a4, name len 16 [ 37.759843][ T410] In ext4_xattr_set_entry s ffffc90000c07780, last = ffff88811dec17a4, name len 16 [ 37.769738][ T410] In ext4_xattr_set_entry s ffffc90000c07780, last = ffff88811dec18a4, name len 16 [ 37.779410][ T410] In ext4_xattr_set_entry s ffffc90000c07780, last = ffff88811dec19a4, name len 16 [ 37.789503][ T410] In ext4_xattr_set_entry s ffffc90000c07780, last = ffff88811dec1aa4, name len 16 [ 37.799626][ T411] In ext4_xattr_set_entry s ffffc90000ce77a0, last = ffff88811dec1ba4, name len 16 [ 37.809679][ T24] audit: type=1400 audit(1663884009.889:153): avc: denied { mounton } for pid=410 comm="syz-executor.0" path="/root/syzkaller-testdir545835884/syzkaller.f1zqEL/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 37.812641][ T411] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 37.837301][ T24] audit: type=1400 audit(1663884009.899:154): avc: denied { remount } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.848260][ T405] In ext4_xattr_set_entry s ffff88810a542480, last = ffff88811dec16a4, name len 24 [ 37.876312][ T405] In next ext4_xattr_set_entry s ffff88811dec16a4, name len 24 [ 37.876330][ T405] In ext4_xattr_set_entry s ffffc90000b17720, last = ffff88810d8b4020, name len 16 [ 37.893674][ T405] In ext4_xattr_set_entry s ffff88810a542200, last = ffff88811dec1aa4, name len 24 [ 37.903680][ T405] In next ext4_xattr_set_entry s ffff88811dec1aa4, name len 24 [ 37.903917][ T405] In ext4_xattr_set_entry s ffffc90000b176a0, last = ffff88811e116020, name len 16 [ 37.921612][ T405] In ext4_xattr_set_entry s ffff88810a542100, last = ffff88811dec17a4, name len 24 [ 37.930922][ T405] In next ext4_xattr_set_entry s ffff88811dec17a4, name len 24 [ 37.930939][ T405] In ext4_xattr_set_entry s ffffc90000b176a0, last = ffff88811e112020, name len 16 [ 37.931973][ T24] audit: type=1400 audit(1663884010.019:155): avc: denied { append } for pid=142 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.938785][ T405] In ext4_xattr_set_entry s ffff88810a542700, last = ffff88811dec19a4, name len 24 [ 37.948049][ T24] audit: type=1400 audit(1663884010.019:156): avc: denied { open } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.969960][ T405] In next ext4_xattr_set_entry s ffff88811dec19a4, name len 24 [ 37.969980][ T405] In ext4_xattr_set_entry s ffffc90000b176a0, last = ffff88811e114020, name len 16 [ 38.019965][ T24] audit: type=1400 audit(1663884010.019:157): avc: denied { getattr } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.020036][ T405] In ext4_xattr_set_entry s ffff88810d860a00, last = ffff88811dec1ba4, name len 24 [ 38.052173][ T405] In next ext4_xattr_set_entry s ffff88811dec1ba4, name len 24 [ 38.052187][ T405] In ext4_xattr_set_entry s ffffc90000b17720, last = ffff88811e110020, name len 16 [ 38.070088][ T405] In ext4_xattr_set_entry s ffff88810cebb280, last = ffff88811dec18a4, name len 24 [ 38.079577][ T405] In next ext4_xattr_set_entry s ffff88811dec18a4, name len 24 [ 38.079598][ T405] In ext4_xattr_set_entry s ffffc90000b176a0, last = ffff88810da98020, name len 16 [ 38.097568][ T405] In ext4_xattr_set_entry s ffff88810d860700, last = ffff88811dec15a4, name len 24 [ 38.107250][ T405] In next ext4_xattr_set_entry s ffff88811dec15a4, name len 24 [ 38.107284][ T405] In ext4_xattr_set_entry s ffffc90000b17740, last = ffff88810da9c020, name len 16 [ 38.124676][ T405] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 38.136482][ T405] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 38.145315][ T405] CPU: 1 PID: 405 Comm: syz-executor.0 Not tainted 5.10.144-syzkaller-987214-g7474313da8d6-dirty #0 [ 38.156351][ T405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/16/2022 [ 38.166836][ T405] RIP: 0010:ext4_xattr_set_entry+0x983/0x2290 [ 38.172887][ T405] Code: 03 48 89 84 24 c0 00 00 00 42 80 3c 28 00 4c 8d b4 24 00 01 00 00 74 08 4c 89 ff e8 47 86 ba ff 49 8b 1f 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 dd 15 00 00 0f b6 0b 83 c1 13 83 e1 fc 48 [ 38.192943][ T405] RSP: 0018:ffffc90000b174a0 EFLAGS: 00010246 [ 38.199003][ T405] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88810c6d93c0 [ 38.206977][ T405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 38.215026][ T405] RBP: ffffc90000b17638 R08: ffffffff81ec6ae8 R09: ffffed1021d75479 [ 38.222982][ T405] R10: ffffed1021d75479 R11: 1ffff11021d75478 R12: 0000000000000000 [ 38.230946][ T405] R13: dffffc0000000000 R14: ffffc90000b175a0 R15: ffffc90000b177a0 [ 38.238906][ T405] FS: 0000555556525400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 38.247816][ T405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.254406][ T405] CR2: 0000555556536b78 CR3: 0000000101984000 CR4: 00000000003506a0 [ 38.262450][ T405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.270413][ T405] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.278684][ T405] Call Trace: [ 38.281963][ T405] ? ext4_xattr_ibody_inline_set+0x380/0x380 [ 38.287928][ T405] ? ext4_reserve_inode_write+0x2d2/0x380 [ 38.293714][ T405] ? __kasan_check_write+0x14/0x20 [ 38.298820][ T405] ext4_xattr_ibody_set+0x7c/0x2a0 [ 38.304232][ T405] ext4_xattr_set_handle+0xc5d/0x15a0 [ 38.309866][ T405] ? ext4_xattr_set_entry+0x2290/0x2290 [ 38.315742][ T405] ? selinux_inode_free_security+0x200/0x200 [ 38.321783][ T405] ext4_initxattrs+0xb2/0x120 [ 38.326443][ T405] security_inode_init_security+0x26c/0x3c0 [ 38.332312][ T405] ? ext4_init_security+0x40/0x40 [ 38.337313][ T405] ? security_dentry_create_files_as+0xd0/0xd0 [ 38.343442][ T405] ? __ext4_set_acl+0x5f0/0x5f0 [ 38.348266][ T405] ? ext4_has_metadata_csum+0x1f0/0x1f0 [ 38.353874][ T405] ext4_init_security+0x34/0x40 [ 38.358699][ T405] __ext4_new_inode+0x3648/0x4530 [ 38.363788][ T405] ? ext4_mark_inode_used+0xc00/0xc00 [ 38.369149][ T405] ? dquot_initialize+0x20/0x20 [ 38.374088][ T405] ? may_create+0x641/0x8b0 [ 38.378583][ T405] ext4_mkdir+0x3b3/0xbb0 [ 38.382900][ T405] ? ext4_symlink+0xf50/0xf50 [ 38.387592][ T405] ? selinux_inode_mkdir+0x22/0x30 [ 38.392787][ T405] ? security_inode_mkdir+0xf1/0x130 [ 38.398424][ T405] vfs_mkdir+0x435/0x610 [ 38.402662][ T405] do_mkdirat+0x1b6/0x2d0 [ 38.407163][ T405] ? do_mknodat+0x430/0x430 [ 38.411747][ T405] ? debug_smp_processor_id+0x17/0x20 [ 38.417123][ T405] __x64_sys_mkdirat+0x7b/0x90 [ 38.421875][ T405] do_syscall_64+0x34/0x70 [ 38.426413][ T405] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 38.432350][ T405] RIP: 0033:0x7f986a88e387 [ 38.436751][ T405] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 38.459592][ T405] RSP: 002b:00007ffe2b7285e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000102 [ 38.468085][ T405] RAX: ffffffffffffffda RBX: 00007ffe2b728670 RCX: 00007f986a88e387 [ 38.476394][ T405] RDX: 00000000000001ff RSI: 00007ffe2b728670 RDI: 00000000ffffff9c [ 38.484434][ T405] RBP: 00007ffe2b72864c R08: 0000000000000000 R09: 0000000000000003 [ 38.492569][ T405] R10: 00007ffe2b728387 R11: 0000000000000206 R12: 0000000000000032 [ 38.500538][ T405] R13: 00000000000093c2 R14: 0000000000000003 R15: 00007ffe2b7286b0 [ 38.508493][ T405] Modules linked in: [ 38.512473][ T405] ---[ end trace 5f9831cceaaf02b1 ]--- [ 38.518117][ T405] RIP: 0010:ext4_xattr_set_entry+0x983/0x2290 [ 38.524571][ T405] Code: 03 48 89 84 24 c0 00 00 00 42 80 3c 28 00 4c 8d b4 24 00 01 00 00 74 08 4c 89 ff e8 47 86 ba ff 49 8b 1f 48 89 d8 48 c1 e8 03 <42> 8a 04 28 84 c0 0f 85 dd 15 00 00 0f b6 0b 83 c1 13 83 e1 fc 48 [ 38.544773][ T405] RSP: 0018:ffffc90000b174a0 EFLAGS: 00010246 [ 38.552306][ T405] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88810c6d93c0 [ 38.560754][ T405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001c [ 38.569189][ T405] RBP: ffffc90000b17638 R08: ffffffff81ec6ae8 R09: ffffed1021d75479 [ 38.577558][ T405] R10: ffffed1021d75479 R11: 1ffff11021d75478 R12: 0000000000000000 [ 38.585952][ T405] R13: dffffc0000000000 R14: ffffc90000b175a0 R15: ffffc90000b177a0 [ 38.594174][ T405] FS: 0000555556525400(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 38.603608][ T405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.610204][ T405] CR2: 000055635dfda098 CR3: 0000000101984000 CR4: 00000000003506b0 [ 38.618532][ T405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.627202][ T405] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.635261][ T405] Kernel panic - not syncing: Fatal exception [ 38.641705][ T405] Kernel Offset: disabled [ 38.646138][ T405] Rebooting in 86400 seconds..